{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T08:51:57Z","timestamp":1767084717615,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,6,25]],"date-time":"2020-06-25T00:00:00Z","timestamp":1593043200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,6,25]]},"DOI":"10.1145\/3377930.3390151","type":"proceedings-article","created":{"date-parts":[[2020,6,29]],"date-time":"2020-06-29T19:29:12Z","timestamp":1593458952000},"page":"1195-1203","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["COUGAR"],"prefix":"10.1145","author":[{"given":"Zachary","family":"Wilkins","sequence":"first","affiliation":[{"name":"Dalhousie University, Halifax, Nova Scotia, Canada"}]},{"given":"Nur","family":"Zincir-Heywood","sequence":"additional","affiliation":[{"name":"Dalhousie University, Halifax, Nova Scotia, Canada"}]}],"member":"320","published-online":{"date-parts":[[2020,6,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ-IEEE.2018.8491625"},{"key":"e_1_3_2_1_2_1","volume-title":"EMBER: An Open Dataset for Training Static PE Malware Machine Learning Models. ArXiv e-prints (April","author":"Anderson H. S.","year":"2018","unstructured":"H. S. Anderson and P. Roth . 2018 . EMBER: An Open Dataset for Training Static PE Malware Machine Learning Models. ArXiv e-prints (April 2018). arXiv:cs.CR\/1804.04637 H. S. Anderson and P. Roth. 2018. EMBER: An Open Dataset for Training Static PE Malware Machine Learning Models. ArXiv e-prints (April 2018). arXiv:cs.CR\/1804.04637"},{"key":"e_1_3_2_1_3_1","volume-title":"Definite uptick': Global wave of ransomware attacks hitting Canadian organizations. CBC News (Oct","author":"Daigle Thomas","year":"2019","unstructured":"Thomas Daigle . 2019. ' Definite uptick': Global wave of ransomware attacks hitting Canadian organizations. CBC News (Oct 2019 ). https:\/\/www.cbc.ca\/news\/technology\/more-ransomware-canada-1.5317871 Thomas Daigle. 2019. 'Definite uptick': Global wave of ransomware attacks hitting Canadian organizations. CBC News (Oct 2019). https:\/\/www.cbc.ca\/news\/technology\/more-ransomware-canada-1.5317871"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWBF.2019.8739186"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2018.00010"},{"key":"e_1_3_2_1_6_1","article-title":"DEAP: Evolutionary Algorithms Made Easy","author":"Fortin F\u00e9lix-Antoine","year":"2012","unstructured":"F\u00e9lix-Antoine Fortin , Fran\u00e7ois-Michel De Rainville , Marc-Andr\u00e9 Gardner , Marc Parizeau , and Christian Gagn\u00e9 . 2012 . DEAP: Evolutionary Algorithms Made Easy . Journal of Machine Learning Research 13 ( July 2012), 2171--2175. F\u00e9lix-Antoine Fortin, Fran\u00e7ois-Michel De Rainville, Marc-Andr\u00e9 Gardner, Marc Parizeau, and Christian Gagn\u00e9. 2012. DEAP: Evolutionary Algorithms Made Easy. Journal of Machine Learning Research 13 (July 2012), 2171--2175.","journal-title":"Journal of Machine Learning Research 13"},{"key":"e_1_3_2_1_7_1","volume-title":"DoS attack on major DNS provider brings Internet to morning crawl. Ars Technica (Oct","author":"Gallagher Sean","year":"2016","unstructured":"Sean Gallagher . 2016. DoS attack on major DNS provider brings Internet to morning crawl. Ars Technica (Oct . 2016 ). https:\/\/arstechnica.com\/information-technology\/2016\/10\/dos-attack-on-major-dns-provider-brings-internet-to-morning-crawl\/ Sean Gallagher. 2016. DoS attack on major DNS provider brings Internet to morning crawl. Ars Technica (Oct. 2016). https:\/\/arstechnica.com\/information-technology\/2016\/10\/dos-attack-on-major-dns-provider-brings-internet-to-morning-crawl\/"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2616498.2616565"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2013.2281534"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046742"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-015-1594-6"},{"key":"e_1_3_2_1_12_1","volume-title":"The WannaCry ransomware attack was temporarily halted. But it's not over yet. (May","author":"Lee Timothy B.","year":"2017","unstructured":"Timothy B. Lee . 2017. The WannaCry ransomware attack was temporarily halted. But it's not over yet. (May 2017 ). https:\/\/www.vox.com\/new-money\/2017\/5\/15\/15641196\/wannacry-ransomware-windows-xp Timothy B. Lee. 2017. The WannaCry ransomware attack was temporarily halted. But it's not over yet. (May 2017). https:\/\/www.vox.com\/new-money\/2017\/5\/15\/15641196\/wannacry-ransomware-windows-xp"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-016-2283-y"},{"key":"e_1_3_2_1_14_1","volume-title":"Frequently Asked Questions. (July","author":"McInnes Leland","year":"2018","unstructured":"Leland McInnes . 2018. Frequently Asked Questions. (July 2018 ). https:\/\/umap-learn.readthedocs.io\/en\/latest\/faq.html Leland McInnes. 2018. Frequently Asked Questions. (July 2018). https:\/\/umap-learn.readthedocs.io\/en\/latest\/faq.html"},{"key":"e_1_3_2_1_15_1","volume-title":"Performance Comparison of Dimension Reduction Implementations. (June","author":"McInnes Leland","year":"2018","unstructured":"Leland McInnes . 2018. Performance Comparison of Dimension Reduction Implementations. (June 2018 ). https:\/\/umap-learn.readthedocs.io\/en\/latest\/benchmarking.html Leland McInnes. 2018. Performance Comparison of Dimension Reduction Implementations. (June 2018). https:\/\/umap-learn.readthedocs.io\/en\/latest\/benchmarking.html"},{"key":"e_1_3_2_1_16_1","volume-title":"Transforming New Data with UMAP. (July","author":"McInnes Leland","year":"2018","unstructured":"Leland McInnes . 2018. Transforming New Data with UMAP. (July 2018 ). https:\/\/umap-learn.readthedocs.io\/en\/latest\/transform.html Leland McInnes. 2018. Transforming New Data with UMAP. (July 2018). https:\/\/umap-learn.readthedocs.io\/en\/latest\/transform.html"},{"key":"e_1_3_2_1_17_1","volume-title":"UMAP: Uniform Manifold Approximation and Projection for Dimension Reduction. ArXiv e-prints (Feb.","author":"McInnes L.","year":"2018","unstructured":"L. McInnes , J. Healy , and J. Melville . 2018 . UMAP: Uniform Manifold Approximation and Projection for Dimension Reduction. ArXiv e-prints (Feb. 2018). arXiv:stat.ML\/1802.03426 L. McInnes, J. Healy, and J. Melville. 2018. UMAP: Uniform Manifold Approximation and Projection for Dimension Reduction. ArXiv e-prints (Feb. 2018). arXiv:stat.ML\/1802.03426"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078195"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSA.2016.7503289"},{"key":"e_1_3_2_1_20_1","volume-title":"Endgame Malware BEnchmark for Research Readme. (Sept","author":"Roth Phil","year":"2019","unstructured":"Phil Roth . 2019. Endgame Malware BEnchmark for Research Readme. (Sept . 2019 ). https:\/\/github.com\/endgameinc\/ember\/blob\/master\/README.md Phil Roth. 2019. Endgame Malware BEnchmark for Research Readme. (Sept. 2019). https:\/\/github.com\/endgameinc\/ember\/blob\/master\/README.md"},{"key":"e_1_3_2_1_21_1","volume-title":"When K-Means Clustering Fails: Alternatives for Segmenting Noisy Data. (Feb","author":"Sukup John","year":"2018","unstructured":"John Sukup . 2018. When K-Means Clustering Fails: Alternatives for Segmenting Noisy Data. (Feb . 2018 ). https:\/\/blogs.oracle.com\/datascience\/when-k-means-clustering-fails%3a-alternatives-for-segmenting-noisy-data John Sukup. 2018. When K-Means Clustering Fails: Alternatives for Segmenting Noisy Data. (Feb. 2018). https:\/\/blogs.oracle.com\/datascience\/when-k-means-clustering-fails%3a-alternatives-for-segmenting-noisy-data"},{"key":"e_1_3_2_1_22_1","volume-title":"LIEF - Library to Instrument Executable Formats. (Nov","author":"Thomas Romain","year":"2019","unstructured":"Romain Thomas . 2019. LIEF - Library to Instrument Executable Formats. (Nov . 2019 ). https:\/\/github.com\/lief-project\/LIEF Romain Thomas. 2019. LIEF - Library to Instrument Executable Formats. (Nov. 2019). https:\/\/github.com\/lief-project\/LIEF"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319619.3326818"}],"event":{"name":"GECCO '20: Genetic and Evolutionary Computation Conference","sponsor":["SIGEVO ACM Special Interest Group on Genetic and Evolutionary Computation"],"location":"Canc\u00fan Mexico","acronym":"GECCO '20"},"container-title":["Proceedings of the 2020 Genetic and Evolutionary Computation Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377930.3390151","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3377930.3390151","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:07Z","timestamp":1750200067000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377930.3390151"}},"subtitle":["clustering of unknown malware using genetic algorithm routines"],"short-title":[],"issued":{"date-parts":[[2020,6,25]]},"references-count":23,"alternative-id":["10.1145\/3377930.3390151","10.1145\/3377930"],"URL":"https:\/\/doi.org\/10.1145\/3377930.3390151","relation":{},"subject":[],"published":{"date-parts":[[2020,6,25]]},"assertion":[{"value":"2020-06-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}